Derek Miers

Principal Analyst serving Enterprise Architecture PROFESSIONALS

Derek serves Enterprise Architecture Professionals. He is an internationally recognized expert in business process management (BPM) and organizational transformation. He has worked in this area for more than 20 years, dealing with major brands, governmental organizations, and nongovernmental organizations (NGOs). Derek's research focuses on the methods, approaches, frameworks, tools, techniques, and technologies of business architecture; BPM; business process improvement; business transformation; and organizational change. He places special emphasis on an outcome-based, customer-focused approach.

Previous Work Experience

Derek is a well-known keynote speaker and chair of major EA conferences. As co-chair of BPMI.org, he helped merge the organization with the Object Management Group (OMG).

Education

Derek completed the Early Growth Program at London Business School.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

59 results in Reports

  • Andras Cser
  • For Security & Risk Professionals

    Report:Prevent Insurance Crime With The Four Cornerstones Of Better Fraud Management

    Insurers Must Catch Up To The Sophistication Of Today's Fraudsters

    Fraud costs the US insurance industry upward of $40 billion, which the industry then passes on to policyholders in the form of higher premiums. Financial crime is on the rise as fraudsters become...

    • Downloads: 372
  • For Security & Risk Professionals

    Report:Market Overview: Cloud Data Protection Solutions

    CDP Solutions Are A Mandatory Security Control

    Security and risk (S&R) professionals must protect data that business and technology management leaders store in cloud services — services that they have little control over or visibility into....

    • Downloads: 138
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Enterprise Fraud Management, Q1 2013

    The Eight Providers That Matter Most And How They Stack Up

    In Forrester's 15-criteria evaluation of enterprise fraud management vendors, we identified the eight most significant vendors in the category — 41st Parameter, ACI Worldwide, CA Technologies,...

    • Downloads: 777
  • For Security & Risk Professionals

    Report:Predictions 2014: Identity And Access Management

    Employee And Customer IAM Head For The Cloud

    Forrester predicts that in 2014, mobile and cloud adoption will continue to drive identity and access management (IAM) toward application programming interface (API) management. As...

    • Downloads: 852
  • For Security & Risk Professionals

    Report:An S&R Pro's Guide To Security To, In, And From The Cloud

    Embrace Cloud As Part Of The Shift To Business Technology

    As organizations rapidly adopt cloud-based infrastructure, platform, and application services, cloud security continues to be a major concern. Now, security and risk professionals need to provide a...

    • Downloads: 731
  • For Security & Risk Professionals

    Report:Assess Your Identity And Access Management Maturity

    An identity and access management (IAM) maturity model is necessary for assessing your current state against industry best practices, understanding your performance relative to that of your peers,...

    • Downloads: 2194
  • For Security & Risk Professionals

    Report:Brief: Reframe The Business Case For Identity And Access Management In Security Terms

    IAM Is More Than Just Operational Streamlining

    The responsibility and the budget for identity and access management (IAM) often reside with a number of different business and technology management teams. Historically, the easy business...

    • Downloads: 9
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 391
  • For Security & Risk Professionals

    Report:Protect Your Digital Assets — Without Driving Customers Away

    The Eight Techniques That Show Promise In This Seemingly Hopeless Fight

    In the publishing, media and entertainment, and services industries, and across many other verticals, fewer and fewer companies deliver their products as physical assets such as printed reports,...

    • Downloads: 139
  • For Security & Risk Professionals

    Report:Security's Cloud Revolution Is Upon Us

    Understanding Information Security Amid Major Cloud Disruption

    A perceived lack of security has been one of the more prominent reasons organizations cite for not adopting cloud services. However, this attitude is changing rapidly as cloud service providers...

    • Downloads: 842
  • For Security & Risk Professionals

    Report:The Forrester Wave™: Public Cloud Platform Service Providers' Security, Q4 2014

    Public Cloud Platforms Step Up Their Security Game, But Is It Enough To Safely Deploy Critical Applications And Data To The Cloud?

    Nearly every large enterprise today is building and deploying new applications on one or more of the leading public cloud platforms. But rarely is this initiative done with the security and risk...

    • Downloads: 397
  • For Security & Risk Professionals

    Report:Build Your Identity And Access Management Strategy

    Strategic Plan: The Identity And Access Management Playbook

    For security and risk (S&R) professionals responsible for building their firm's identity and access management strategy (IAM) for both internal and customer-facing IAM properties and processes, we...

    • Downloads: 1266
  • For Security & Risk Professionals

    Report:Quick Take: Apple's iPhone 5S: The "S" Is For Security

    Biometrics Is Reborn On The Mobile Phone

    Biometrics has always held tremendous promise for better security, but it's never quite gained a solid foothold due to privacy concerns, cost of implementation, and availability of other substitute...

    • Downloads: 222
  • For Security & Risk Professionals

    Report:Evolve Your Identity Strategy For Your Digital Business

    Executive Overview: The Identity And Access Management Playbook

    The rapid adoption of mobile devices and cloud services, together with a multitude of new partnerships and customer-facing applications, has "extended" the identity boundary of today's digital...

    • Downloads: 986
  • For CIO Professionals

    Report:Quick Take: CIOs Must Respond To Amazon's Disruptive Cloud

    Amazon's Relentless Pace Continues At re:Invent With Nine New Services

    The Amazon Web Services (AWS) re:Invent 2014 conference is something of an understatement as far as names go. This year's AWS conference was bigger than ever, with more than 13,500 attendees from 63...

    • Downloads: 163
  • For Security & Risk Professionals

    Report:Introducing The Customer Authentication Assessment Framework

    Assess The Usability, Deployability, And Security Of Customers' Login Processes

    Forrester clients often face a hybrid challenge with customer-facing websites: optimizing both security and usability. The tightest security can be a usability disaster, and the most user-friendly...

    • Downloads: 476
  • For Security & Risk Professionals

    Report:Brief: Apple Throws Down The Privacy Gauntlet

    Apple Offers New Commitment And Tech To Protect Privacy, But It Needs To Go Much Further

    On September 17, 2014, Apple's chief executive officer, Tim Cook, published a letter detailing Apple's commitment to customer privacy. The unfortunate timing of Apple's highly public and embarrassing...

    • Downloads: 62
  • For Security & Risk Professionals

    Report:Critical Questions To Ask Your Privileged Identity Management Solution Provider

    Cloud Support, Threat Management, And Behavioral Analytics Are Now Mandatory Features

    Technology management professionals with administrator privileges have the responsibility to ensure that their critical business technology is secure, available, and achieving performance...

    • Downloads: 173
  • For Security & Risk Professionals

    Report:Quick Take: Moving On Up The Security Stack, F5 Acquires Versafe

    On September 17, F5 Networks announced its acquisition of web security and antifraud vendor Versafe for an undisclosed sum. With this acquisition, F5 expands its burgeoning security portfolio beyond...

    • Downloads: 110
  • For Security & Risk Professionals

    Report:Forrester's Customer IAM Security Maturity Model

    Customer identity and access management (IAM) is essential to providing customers an easy-to-use, easy-to-administer, cost-effective, and most importantly, secure, experience. This Customer IAM...

    • Downloads: 48
  • For Security & Risk Professionals

    Report:Transform And Protect Your Customers' Mobile Moments With Seamless Authentication

    Business Case: The Mobile Security Playbook

    Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers' privacy...

    • Downloads: 189
  • For Security & Risk Professionals

    Report:Introducing Forrester's Customer IAM Security Maturity Assessment Model

    Assessment: The Identity And Access Management Playbook

    Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can't register for or log into your website, mobile app, or phone system, or...

    • Downloads: 342
  • For Security & Risk Professionals

    Report:Market Overview: Employee And Customer Authentication Solutions In 2013, Part 1 Of 2

    Seven Major Trends Every Security Pro Needs To Understand, Including Attempts To "Kill The Password"

    It's a critical time in user authentication — and a confusing one. Passwords and traditional out-of-wallet questions are go-to security measures, but are weakening by the day. At the same time,...

    • Downloads: 718
  • For CIO Professionals

    Report:Quick Take: Apple's WWDC 2014 Tour De Force

    New Developer Tools And Business Features Will Strengthen Apple's Leading Position In The Age Of The Customer

    Introduced by Apple CEO Tim Cook, Apple software leader Craig Federighi motored through a dense list of new operating systems, iOS 8 and OS X Yosemite, compelling new customer features such as the...

    • Downloads: 138
  • For Security & Risk Professionals

    Report:Quick Take: Apple Positioned For Key Role In Secure Payment Processing, Fraud Prevention

    Touch ID, NFC, And iTunes Are Key Ingredients For A Payment Ecosystem Offering Superior Client-Side Fraud Management

    On Monday, June 2, 2014, at their Worldwide Developer Conference, among a number of other things, Apple announced that it has opened up its fingerprint reader, Touch ID, to third-party...

    • Downloads: 170